O'Reilly logo

Voice over IP Security by Patrick Park

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 7. Protection with VoIP Protocol

This chapter covers the methodology of protection with VoIP protocol (SIP) in the following sectors:

This chapter demonstrates how to make Voice over Internet Protocol (VoIP) service secure with VoIP protocols, Session Initiation Protocol (SIP), and other supplementary protocols. Other session protocols like H.323 also have similar specifications and recommendations for security, which are not described here to avoid redundancy. Chapter 3, “Security Profiles in VoIP Protocols,” covers the security profiles of H.323.

This chapter focuses on the methodology of protection with SIP in the following categories:

  • Authentication ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required